Keyword | Year Pub | Article | Title | Authors |
Facebook | 2024 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
Facebook | 2018 | View | Facebook Fanatics: A Linguistic and Sentiment Analysis of the Most “Fanned” Facebook Pages |
Peslak
|
Facebook | 2012 | View | Social Networking Systems and Campus Life |
Sgambato, Petkov, Wolf
|
facilitation | 2021 | View | Interpreting Organizational Security Governance Objectives for Strategic Security Planning |
Mishra
|
factor analysis | 2012 | View | An Empirical Study of Social Networking Behavior Using Theory of Reasoned Action |
Peslak, Ceccucci, Sendall
|
factor analysis | 2010 | View | An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory |
Peslak, Ceccucci, Sendall
|
failed projects | 2014 | View | The De-Escalation of the DHS HSIN Next Gen Project |
Rosenhauer, Korzaan
|
Features | 2019 | View | Adversarial Machine Learning for Cyber Security |
De Lucia, Cotton
|
Federal Government | 2021 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
financial decision support systems | 2015 | View | Building a Better Stockbroker: Managing Big (Financial) Data by Constructing an Ontology-Based Framework |
Westrick, Du, Wolffe
|
financial industry | 2015 | View | A Cloud Computing Methodology Study of Platform-as-a-Service (PaaS) in the Financial Industry |
Lawler, Howell-Barber, Joseph
|
financial industry | 2014 | View | A Study of Cloud Computing Infrastructure-as-a-Service (IaaS) in Financial Firms |
Lawler, Howell-Barber, Joseph, Narula
|
firm-level capabilities | 2013 | View | A Study of Cloud Computing Software-as-a-Service (SaaS) in Financial Firms |
Lawler, Howell-Barber, Desai, Joseph
|
firm-level capabilities | 2009 | View | The Impact of Technology Diffusion on Employment, Compensation, and Productivity: Evidence from the Telecommunications Sector |
Clark, Moussawi
|
fit | 2011 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
fitness trackers | 2021 | View | Privacy Concerns and Data Sharing Habits of Personal Fitness Information Collected via Activity Trackers |
Pinchot, Cellante
|
Flow | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Flow Theory | 2019 | View | Aligning the Factors of Skill, Technology and Task to Influence the Continued Use of Mobile Payment Users in China |
Chen, Choi, Xiong, Tang
|
forensics | 2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Framework | 2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
Framework | 2011 | View | Creating a Framework for Research on Virtual Organizations |
Reinicke
|
frameworks | 2019 | View | Where We are with Enterprise Architecture |
Halawi, McCarthy, farah
|
fraud | 2022 | View | Combating Private Blockchain Fraud: A Virtual Reality & Artificial Intelligence Model
|
Aimiuwu
|
fraud | 2012 | View | Applying Business Intelligence Concepts to Medicaid Claim Fraud Detection |
Copeland, Edberg, Wendel
|
frontier analysis | 2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
fun | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
Function point | 2013 | View | Early Stage Probabilistic Software Project Schedule Estimation |
Kwon, Hammell II
|